{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T15:35:49.710","vulnerabilities":[{"cve":{"id":"CVE-2006-2026","sourceIdentifier":"cve@mitre.org","published":"2006-04-25T23:02:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Double free vulnerability in tif_jpeg.c in libtiff before 3.8.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image that triggers errors related to \"setfield/getfield methods in cleanup functions.\""}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","baseScore":6.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-119"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*","versionEndIncluding":"3.8.0","matchCriteriaId":"8D44E5F5-3351-47E6-81D5-859DA1A90E1B"},{"vulnerable":true,"criteria":"cpe:2.3:a:libtiff:libtiff:3.4:*:*:*:*:*:*:*","matchCriteriaId":"CCA5EEB8-9D2C-49A9-BB08-CE5017B79D81"},{"vulnerable":true,"criteria":"cpe:2.3:a:libtiff:libtiff:3.5.1:*:*:*:*:*:*:*","matchCriteriaId":"261FAE51-5207-4136-9FFE-2330A281266C"},{"vulnerable":true,"criteria":"cpe:2.3:a:libtiff:libtiff:3.5.2:*:*:*:*:*:*:*","matchCriteriaId":"B32C83B9-F7DA-450A-A687-9A73734CD712"},{"vulnerable":true,"criteria":"cpe:2.3:a:libtiff:libtiff:3.5.3:*:*:*:*:*:*:*","matchCriteriaId":"9485283A-B73E-4567-914A-42A86F5FFCB4"},{"vulnerable":true,"criteria":"cpe:2.3:a:libtiff:libtiff:3.5.4:*:*:*:*:*:*:*","matchCriteriaId":"95892168-0FB6-4E3F-9303-2F9B3CF60D2B"},{"vulnerable":true,"criteria":"cpe:2.3:a:libtiff:libtiff:3.5.5:*:*:*:*:*:*:*","matchCriteriaId":"A5021564-5E0A-4DDC-BC68-200B6050043E"},{"vulnerable":true,"criteria":"cpe:2.3:a:libtiff:libtiff:3.5.6:*:*:*:*:*:*:*","matchCriteriaId":"11C50750-FE1D-42BA-9125-7D8E872AA2DB"},{"vulnerable":true,"criteria":"cpe:2.3:a:libtiff:libtiff:3.5.7:*:*:*:*:*:*:*","matchCriteriaId":"19AA66E5-FDDD-4243-B945-DFEBDD25F258"},{"vulnerable":true,"criteria":"cpe:2.3:a:libtiff:libtiff:3.6.0:*:*:*:*:*:*:*","matchCriteriaId":"62F359CD-5DC4-4919-B8E1-95BDDBD27EFC"},{"vulnerable":true,"criteria":"cpe:2.3:a:libtiff:libtiff:3.6.1:*:*:*:*:*:*:*","matchCriteriaId":"D2C8C550-3313-4266-B4B3-E9E9047CFE04"},{"vulnerable":true,"criteria":"cpe:2.3:a:libtiff:libtiff:3.7.0:*:*:*:*:*:*:*","matchCriteriaId":"ABEEBA7B-81D5-4148-912B-9AD448BBE741"},{"vulnerable":true,"criteria":"cpe:2.3:a:libtiff:libtiff:3.7.1:*:*:*:*:*:*:*","matchCriteriaId":"448555FE-8E91-4EA7-BA05-6915F5508319"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc","source":"cve@mitre.org"},{"url":"http://bugzilla.remotesensing.org/show_bug.cgi?id=1102","source":"cve@mitre.org","tags":["Exploit","Patch"]},{"url":"http://secunia.com/advisories/19838","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/19897","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/19936","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/19949","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/19964","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/20021","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/20023","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/20210","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/20345","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/20667","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-103099-1","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-66-201332-1","source":"cve@mitre.org"},{"url":"http://support.avaya.com/elmodocs2/security/ASA-2006-119.htm","source":"cve@mitre.org"},{"url":"http://www.debian.org/security/2006/dsa-1054","source":"cve@mitre.org"},{"url":"http://www.gentoo.org/security/en/glsa/glsa-200605-17.xml","source":"cve@mitre.org"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:082","source":"cve@mitre.org"},{"url":"http://www.novell.com/linux/security/advisories/2006_04_28.html","source":"cve@mitre.org"},{"url":"http://www.redhat.com/support/errata/RHSA-2006-0425.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/17733","source":"cve@mitre.org"},{"url":"http://www.trustix.org/errata/2006/0024","source":"cve@mitre.org"},{"url":"http://www.vupen.com/english/advisories/2006/1563","source":"cve@mitre.org"},{"url":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=189933","source":"cve@mitre.org","tags":["Exploit","Patch"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26135","source":"cve@mitre.org"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11389","source":"cve@mitre.org"},{"url":"https://usn.ubuntu.com/277-1/","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://bugzilla.remotesensing.org/show_bug.cgi?id=1102","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch"]},{"url":"http://secunia.com/advisories/19838","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/19897","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/19936","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/19949","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/19964","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/20021","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/20023","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/20210","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/20345","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/20667","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-103099-1","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-66-201332-1","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://support.avaya.com/elmodocs2/security/ASA-2006-119.htm","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.debian.org/security/2006/dsa-1054","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.gentoo.org/security/en/glsa/glsa-200605-17.xml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:082","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.novell.com/linux/security/advisories/2006_04_28.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/support/errata/RHSA-2006-0425.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/17733","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.trustix.org/errata/2006/0024","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.vupen.com/english/advisories/2006/1563","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=189933","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26135","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11389","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://usn.ubuntu.com/277-1/","source":"af854a3a-2127-422b-91ae-364da2661108"}],"evaluatorSolution":"This vulnerability is addressed in the following product release:\r\nlibTIFF, libTIFF, 3.8.1"}}]}